Malware Analysis Report

2025-08-10 18:19

Sample ID 220207-x4e4ysgafj
Target 9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7
SHA256 9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7
Tags
gozi_ifsb banker macro persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7

Threat Level: Known bad

The file 9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7 was found to be: Known bad.

Malicious Activity Summary

gozi_ifsb banker macro persistence trojan

Suspicious use of NtCreateProcessExOtherParentProcess

Gozi, Gozi IFSB

Suspicious Office macro

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Adds Run key to start application

Drops file in Windows directory

Program crash

Enumerates physical storage devices

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Suspicious behavior: AddClipboardFormatListener

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Checks processor information in registry

Modifies registry class

Modifies data under HKEY_USERS

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-02-07 19:24

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-02-07 19:24

Reported

2022-02-08 00:38

Platform

win7-en-20211208

Max time kernel

162s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe"

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Suspicious Office macro

macro
Description Indicator Process Target
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\WerFault.exe N/A
N/A N/A C:\Windows\system32\WerFault.exe N/A
N/A N/A C:\Windows\system32\WerFault.exe N/A
N/A N/A C:\Windows\system32\WerFault.exe N/A
N/A N/A C:\Windows\system32\WerFault.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\system32\WerFault.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 968 wrote to memory of 544 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe
PID 968 wrote to memory of 544 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe
PID 968 wrote to memory of 544 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe
PID 968 wrote to memory of 544 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe
PID 968 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 968 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 968 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 968 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 544 wrote to memory of 984 N/A C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\Windows\system32\WerFault.exe
PID 544 wrote to memory of 984 N/A C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\Windows\system32\WerFault.exe
PID 544 wrote to memory of 984 N/A C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\Windows\system32\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe

"C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe"

C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe"

C:\ProgramData\Synaptics\Synaptics.exe

"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 544 -s 624

Network

Country Destination Domain Proto
US 8.8.8.8:53 xred.mooo.com udp
US 8.8.8.8:53 freedns.afraid.org udp
US 69.42.215.252:80 freedns.afraid.org tcp
US 8.8.8.8:53 docs.google.com udp
NL 142.251.36.14:443 docs.google.com tcp

Files

memory/968-54-0x00000000754B1000-0x00000000754B3000-memory.dmp

memory/968-55-0x0000000000220000-0x0000000000221000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe

MD5 555ed1066eb7ef02f2242920bf34bc9e
SHA1 307ca4bfeef4277e10d2ae54e1677ed3dd09b932
SHA256 6f86c9ff81b678571ffdf51e7459ffbb730a9528696b6dd87919d86e008b6b36
SHA512 57fde10423a72aeaf4d27a361ce68d61b5989eb4ffd833c44eb30c60c94e5de48818b31164c1f71efe2966243c19d7a3d6f9b962a9f4aa3b3f3f60c5b625d633

\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe

MD5 555ed1066eb7ef02f2242920bf34bc9e
SHA1 307ca4bfeef4277e10d2ae54e1677ed3dd09b932
SHA256 6f86c9ff81b678571ffdf51e7459ffbb730a9528696b6dd87919d86e008b6b36
SHA512 57fde10423a72aeaf4d27a361ce68d61b5989eb4ffd833c44eb30c60c94e5de48818b31164c1f71efe2966243c19d7a3d6f9b962a9f4aa3b3f3f60c5b625d633

C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe

MD5 555ed1066eb7ef02f2242920bf34bc9e
SHA1 307ca4bfeef4277e10d2ae54e1677ed3dd09b932
SHA256 6f86c9ff81b678571ffdf51e7459ffbb730a9528696b6dd87919d86e008b6b36
SHA512 57fde10423a72aeaf4d27a361ce68d61b5989eb4ffd833c44eb30c60c94e5de48818b31164c1f71efe2966243c19d7a3d6f9b962a9f4aa3b3f3f60c5b625d633

C:\ProgramData\Synaptics\Synaptics.exe

MD5 2f44bf5f78b0ebfa53e27aed28f9d839
SHA1 0fe0440e7d3dcde442d32d3d76eb50c172f8bf8e
SHA256 d6acf884893f7fc6a9d532f5cddcf8c858fd5306d58a9aee670b49a77d3385d7
SHA512 92018ffdbcd791fe57af541d2a2f3488cd0cbc8c691eff04df5a3711884bab3082bfdb0650fbe83083dc7ba755788e482186c9821c5a0e02929e12b59a19ea64

\ProgramData\Synaptics\Synaptics.exe

MD5 2f44bf5f78b0ebfa53e27aed28f9d839
SHA1 0fe0440e7d3dcde442d32d3d76eb50c172f8bf8e
SHA256 d6acf884893f7fc6a9d532f5cddcf8c858fd5306d58a9aee670b49a77d3385d7
SHA512 92018ffdbcd791fe57af541d2a2f3488cd0cbc8c691eff04df5a3711884bab3082bfdb0650fbe83083dc7ba755788e482186c9821c5a0e02929e12b59a19ea64

\ProgramData\Synaptics\Synaptics.exe

MD5 2f44bf5f78b0ebfa53e27aed28f9d839
SHA1 0fe0440e7d3dcde442d32d3d76eb50c172f8bf8e
SHA256 d6acf884893f7fc6a9d532f5cddcf8c858fd5306d58a9aee670b49a77d3385d7
SHA512 92018ffdbcd791fe57af541d2a2f3488cd0cbc8c691eff04df5a3711884bab3082bfdb0650fbe83083dc7ba755788e482186c9821c5a0e02929e12b59a19ea64

memory/1124-65-0x0000000000220000-0x0000000000221000-memory.dmp

memory/544-66-0x0000000000EB0000-0x00000000019B0000-memory.dmp

memory/544-67-0x000007FEF4BA0000-0x000007FEF558C000-memory.dmp

memory/1408-68-0x000000002F171000-0x000000002F174000-memory.dmp

memory/1408-69-0x0000000070E11000-0x0000000070E13000-memory.dmp

memory/544-70-0x000000001BCB0000-0x000000001BCB2000-memory.dmp

memory/1408-71-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/1408-72-0x0000000071DFD000-0x0000000071E08000-memory.dmp

memory/984-74-0x000007FEFB571000-0x000007FEFB573000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\uL99CDV9.xlsm

MD5 e566fc53051035e1e6fd0ed1823de0f9
SHA1 00bc96c48b98676ecd67e81a6f1d7754e4156044
SHA256 8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512 a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

memory/984-78-0x0000000001C20000-0x0000000001C21000-memory.dmp

C:\ProgramData\Synaptics\Synaptics.exe

MD5 2f44bf5f78b0ebfa53e27aed28f9d839
SHA1 0fe0440e7d3dcde442d32d3d76eb50c172f8bf8e
SHA256 d6acf884893f7fc6a9d532f5cddcf8c858fd5306d58a9aee670b49a77d3385d7
SHA512 92018ffdbcd791fe57af541d2a2f3488cd0cbc8c691eff04df5a3711884bab3082bfdb0650fbe83083dc7ba755788e482186c9821c5a0e02929e12b59a19ea64

Analysis: behavioral2

Detonation Overview

Submitted

2022-02-07 19:24

Reported

2022-02-08 00:38

Platform

win10v2004-en-20220112

Max time kernel

176s

Max time network

177s

Command Line

%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Suspicious use of NtCreateProcessExOtherParentProcess

Description Indicator Process Target
PID 3640 created 876 N/A C:\Windows\system32\WerFault.exe C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat C:\Windows\System32\svchost.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\system32\MusNotifyIcon.exe N/A
Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\system32\MusNotifyIcon.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" C:\Windows\System32\svchost.exe N/A
Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132889305503510103" C:\Windows\System32\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "3.478254" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4040" C:\Windows\System32\svchost.exe N/A
Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" C:\Windows\System32\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.013208" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" C:\Windows\System32\svchost.exe N/A
Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3844" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" C:\Windows\System32\svchost.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" C:\Windows\System32\svchost.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\WerFault.exe N/A
N/A N/A C:\Windows\system32\WerFault.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2584 wrote to memory of 876 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe
PID 2584 wrote to memory of 876 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe
PID 2584 wrote to memory of 1832 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 2584 wrote to memory of 1832 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 2584 wrote to memory of 1832 N/A C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 3640 wrote to memory of 876 N/A C:\Windows\system32\WerFault.exe C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe
PID 3640 wrote to memory of 876 N/A C:\Windows\system32\WerFault.exe C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe
PID 876 wrote to memory of 3992 N/A C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\Windows\system32\WerFault.exe
PID 876 wrote to memory of 3992 N/A C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe C:\Windows\system32\WerFault.exe

Processes

C:\Windows\system32\MusNotifyIcon.exe

%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13

C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe

"C:\Users\Admin\AppData\Local\Temp\9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe"

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k NetworkService -p

C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe"

C:\ProgramData\Synaptics\Synaptics.exe

"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -pss -s 436 -p 876 -ip 876

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 876 -s 1012

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 876 -s 1012

Network

Country Destination Domain Proto
US 8.8.8.8:53 settings-win.data.microsoft.com udp
NL 20.73.194.208:443 settings-win.data.microsoft.com tcp
NL 20.73.194.208:443 settings-win.data.microsoft.com tcp
NL 20.73.194.208:443 settings-win.data.microsoft.com tcp
US 8.238.111.254:80 tcp
NL 8.248.7.254:80 tcp
NL 104.80.224.57:443 tcp
NL 8.248.7.254:80 tcp
NL 20.73.194.208:443 settings-win.data.microsoft.com tcp
US 8.8.8.8:53 geo.prod.do.dsp.mp.microsoft.com udp
US 40.91.73.169:443 geo.prod.do.dsp.mp.microsoft.com tcp
US 8.8.8.8:53 kv801.prod.do.dsp.mp.microsoft.com udp
NL 184.29.205.60:443 kv801.prod.do.dsp.mp.microsoft.com tcp
NL 20.73.194.208:443 settings-win.data.microsoft.com tcp

Files

memory/2584-131-0x0000000002D30000-0x0000000002D31000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe

MD5 555ed1066eb7ef02f2242920bf34bc9e
SHA1 307ca4bfeef4277e10d2ae54e1677ed3dd09b932
SHA256 6f86c9ff81b678571ffdf51e7459ffbb730a9528696b6dd87919d86e008b6b36
SHA512 57fde10423a72aeaf4d27a361ce68d61b5989eb4ffd833c44eb30c60c94e5de48818b31164c1f71efe2966243c19d7a3d6f9b962a9f4aa3b3f3f60c5b625d633

C:\Users\Admin\AppData\Local\Temp\._cache_9ad6dfda0f3827455a92003ae4d7a413a932d7ff0ec99bf1bf36f8cb9e1e31f7.exe

MD5 555ed1066eb7ef02f2242920bf34bc9e
SHA1 307ca4bfeef4277e10d2ae54e1677ed3dd09b932
SHA256 6f86c9ff81b678571ffdf51e7459ffbb730a9528696b6dd87919d86e008b6b36
SHA512 57fde10423a72aeaf4d27a361ce68d61b5989eb4ffd833c44eb30c60c94e5de48818b31164c1f71efe2966243c19d7a3d6f9b962a9f4aa3b3f3f60c5b625d633

memory/876-134-0x0000020F21120000-0x0000020F21C20000-memory.dmp

C:\ProgramData\Synaptics\Synaptics.exe

MD5 2f44bf5f78b0ebfa53e27aed28f9d839
SHA1 0fe0440e7d3dcde442d32d3d76eb50c172f8bf8e
SHA256 d6acf884893f7fc6a9d532f5cddcf8c858fd5306d58a9aee670b49a77d3385d7
SHA512 92018ffdbcd791fe57af541d2a2f3488cd0cbc8c691eff04df5a3711884bab3082bfdb0650fbe83083dc7ba755788e482186c9821c5a0e02929e12b59a19ea64

C:\ProgramData\Synaptics\Synaptics.exe

MD5 2f44bf5f78b0ebfa53e27aed28f9d839
SHA1 0fe0440e7d3dcde442d32d3d76eb50c172f8bf8e
SHA256 d6acf884893f7fc6a9d532f5cddcf8c858fd5306d58a9aee670b49a77d3385d7
SHA512 92018ffdbcd791fe57af541d2a2f3488cd0cbc8c691eff04df5a3711884bab3082bfdb0650fbe83083dc7ba755788e482186c9821c5a0e02929e12b59a19ea64

memory/876-137-0x00007FF8071D0000-0x00007FF807C91000-memory.dmp

memory/1832-138-0x0000000002110000-0x0000000002111000-memory.dmp

memory/876-139-0x0000020F3D730000-0x0000020F3D732000-memory.dmp

memory/3792-140-0x00007FF7E7F90000-0x00007FF7E7FA0000-memory.dmp

memory/3792-142-0x00007FF7E7F90000-0x00007FF7E7FA0000-memory.dmp

memory/3792-141-0x00007FF7E7F90000-0x00007FF7E7FA0000-memory.dmp

memory/3792-143-0x00007FF7E7F90000-0x00007FF7E7FA0000-memory.dmp

memory/3792-144-0x00007FF7E7F90000-0x00007FF7E7FA0000-memory.dmp

memory/3792-145-0x00007FF827F10000-0x00007FF828105000-memory.dmp

memory/3792-146-0x00007FF827F10000-0x00007FF828105000-memory.dmp